999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Improved DHOA-Fuzzy Based Load Scheduling in IoT Cloud Environment

2022-08-24 03:31:56JoshuaSamuelRajIlangoPrinceThomasUmaFahdAlWesabiRadwaMarzoukandAnwerMustafaHilal
Computers Materials&Continua 2022年5期

R.Joshua Samuel Raj,V.Ilango,Prince Thomas,V.R.Uma,Fahd N.Al-Wesabi,Radwa Marzouk and Anwer Mustafa Hilal

1Department of Information Science&Engineering,CMR Institute of Technology,Bengaluru,560037,India

2Department of Computer Application,CMR Institute of Technology,Bangalore,560037,India

3School of Computing,Woldia Institute of Technology,Woldia University,Ethiopia

4Department of Commerce,School of Commerce,Finance and Accountancy,Christ University,Bangalore,560029,India

5Department of Computer Science,College of Science&Art at Mahayil,King Khalid University,Saudi Arabia

6Faculty of Computer and IT,Sana’a University,Yemen

7Department of Information Systems,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Saudi Arabia

8Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,Alkharj,Saudi Arabia

Abstract: Internet of things (IoT) has been significantly raised owing to the development of broadband access network,machine learning(ML),big data analytics(BDA),cloud computing(CC),and so on.The development of IoT technologies has resulted in a massive quantity of data due to the existence of several people linking through distinct physical components, indicating the status of the CC environment.In the IoT, load scheduling is realistic technique in distinct data center to guarantee the network suitability by falling the computer hardware and software catastrophe and with right utilize of resource.The ideal load balancer improves many factors of Quality of Service(QoS) like resource performance, scalability, response time, error tolerance,and efficiency.The scholar is assumed as load scheduling a vital problem in IoT environment.There are many techniques accessible to load scheduling in IoT environments.With this motivation,this paper presents an improved deer hunting optimization algorithm with Type II fuzzy logic(IDHOA-T2F)model for load scheduling in IoT environment.The goal of the IDHOA-T2F is to diminish the energy utilization of integrated circuit of IoT node and enhance the load scheduling in IoT environments.The IDHOA technique is derived by integrating the concepts of Nelder Mead (NM) with the DHOA.The proposed model also synthesized the T2L based on fuzzy logic(FL)systems to counterbalance the load distribution.The proposed model finds useful to improve the efficiency of IoT system.For validating the enhanced load scheduling performance of the IDHOA-T2F technique,a series of simulations take place to highlight the improved performance.The experimental outcomes demonstrate the capable outcome of the IDHOA-T2F technique over the recent techniques.

Keywords: Load scheduling; internet of things; cloud computing;metaheuristics;fuzzy logic

1 Introduction

In recent times, Internet of Things (IoT) was developed as the most important revolution in information and communication technology (ICT) production [1].By IoT, Internet connections extended over standard smart devices namely smartphone and tablet for different range of devices(machine, vehicle, sensors, and so on.) for accomplishing several distinct applications and services namely health care,medicinal treatment,traffic controller,energy organization,vehicle network,and so on.This generates a massive number of information which require that exists saved,processed,and analyzed for obtaining valuable data for meeting user aim as well as requires [2].Also, the number and scale of applications and services are improving quickly that needs processing ability which even one of the powerful smart devices could not presently meet.The Cloud environment that is recognized as huge resource center which permits ubiquitous access for sharing as well as providing resources to users flexible with virtualization approach is a potential platform for supporting IoT progresses.Limitations of recent smart devices are minimization by getting time utilization and resource intensive tasks for powerful computing environment namely Cloud computing (CC) but exit the easy task to smart device for handling.But,if relating IoT as well as CC,novel issues appear[3].

An IoT is enormous advantage to their lives, assisting those by relating many sensors and actuators.Besides,relating to many requests to varying devices all simultaneously is a general subject for scholar analyzing the IoT.It could not only interfere with the smooth efficiency of an IoT ecosystems along with lead to load balancing(LB)issues.Researches are thoroughly examined LB in allocated environment and network[4].The LB is 2 modes:unaware(allocating the request similarly to every server,regardless of its load)and conscious(transmitting the request from worse loaded servers).LB goals at making sure which processor in the model does approximately a similar load of work at all particular times.LB amongst every virtual device is a vital topic in IoT due to many desires and variety of resources.It can be important topic in IoT;it can be helpful if any points are overload,some under-loaded and remainder is idle with no interfering with the effective model[5].

An optimum load balancer improves many factors of Quality of Service (QoS) like resource performance, scalability, response time, error tolerance, and efficiency [6].It can be need for a nonlinear technique for handling this problem as their aim for improving the LB and reducing energy utilization as NPhard problem.An IoT is difficult for wireless gadget/hub interrelating with sending packages for everyone or another gadget/hub, not containing some outline control information for routing.IoT centers are unrestricted amount of schemes and flexibility to different hubs.An important problem in IoT is the secured broadcast from source-destination.At this point, it can be presented LB manner for minimized the energy utilization of combined circuit of IoT node and enhance the LB in IoT platform [7].Kumar et al.[8] establish a task processing structure which is the decision making ability for selecting the optimum resource at runtime for processing the application(different and difficult nature) at virtual machine (VM) utilizing modified particle swarm optimization (PSO)technique in end-user deadline.The presented technique offers non-dominance group of optimum solutions and enhances different effective parameters (task acceptance ratio, throughput, time, and cost)by sequence of experimentations on distinct synthetic datasets utilizing Cloudsim tool.

This paper presents an improved deer hunting optimization algorithm with Type II fuzzy logic(IDHOA-T2F) model to load scheduling in IoT environments.The goal of the IDHOA-T2F is to diminish the energy utilization of integrated circuit of IoT node and enhance the load scheduling in IoT environments.The IDHOA technique is derived by integrating the concepts of Nelder Mead(NM)with the DHOA.The proposed model also synthesized the T2L based on fuzzy logic(FL)systems to counterbalance the load distribution.The proposed model finds useful to improve the efficiency of IoT systems.For validating the enhanced load scheduling performance of the IDHOA-T2F technique,a series of simulations take place to highlight the improved performance.

The rest of the paper is organized as follows.Section 2 offers the related works,Section 3 provides the proposed model,Section 4 validates the results,and Section 5 concludes the paper.

2 Related Works

Ma et al.[9] present the deadline and cost-aware scheduling technique which minimizing the executing cost of progress in deadline constraint from IaaS approach.Assuming the VM efficiency difference and acquisition delay,it can be initial separate tasks as to varying levels based on topological framework so no dependencies exist among tasks at a similar level.In 3 strings are utilized for coding the genes in presented technique for optimum reproduce the heterogeneous and resilient features of cloud environment.Afterward, the heterogeneous earliest finish time (HEFT) was utilized for generating those with minimal completion time as well as cost.Fadlallah et al.[10] planned and validated greedy scheduling and LB techniques for improving the consumption of resources.It can be shown a comparative analysis with longest cloudlet fact processing(LCFP),shortest cloudlet fact processing(SCFP),and Min-Min heuristic techniques.The selection of an individual’s 3 techniques was dependent upon the performance and simplicity of its systems, as described in the works, to allocate task to device.

Narman et al.[11] presented dynamic dedicate server scheduling to heterogeneous as well as homogeneous methods for effectively giving wanted service by regarding priorities of requests.Refaat et al.[12] present a novel scheduling approach to control real time and soft service request in Fog methods that are named decentralize load-balance scheduling(DLBS).The projected techniques give decentralization LB control technique.This technique allocates the load depends on kind of service request and load status of all fog nodes.Gawali et al.[13] introduce a heuristic technique which comprises the modified analytic hierarchy process (MAHP), bandwidth aware divisible scheduling(BATS)+BAR optimization,longest expected processing time preemption(LEPT),and divide-andconquer techniques for performing task scheduling (TS) and resource allocation (RA).During this method, all tasks are managed earlier their actual distribution to cloud resource employing MAHP method.The resource is distributed utilizing the collective BATS+BAR optimization technique that assumes the bandwidth and load of cloud resource as constraint.Wang et al.[14]analyses the feature of IoT request and intend to an enhanced Poisson task method with new approach for predicting the arrivals of IoT requests.It can be present an adaptive energy performance method for adjusting the priority of an optimized objective.Lastly,an energy-efficient VM scheduling technique was presented for maximizing the energy performance of data center.

In Maamari et al.[15],a dynamic adaptive PSO(DAPSO)algorithm was executed for improving the efficiency of basic PSO technique for optimizing the task runtime by minimized the makespan of specific task set, and at once, maximized resource consumption.Therefore, a TS technique is presented for scheduling the independence task on CC.The presented technique was assumed an amalgamation of DAPSO technique and the Cuckoo search (CS) technique is named MDAPSO.Ni et al.[16] presented a 3-layer scheduling method dependent on whale-Gaussian cloud.In the second layer of approach,the whale optimization approach dependent upon Gaussian cloud technique(GCWOAS2)was utilized to multi-objective TS in CC that is for minimizing the completion time of task through efficiently employing the VM resource and for keeping the LB of all VM, decreasing the effective cost of model.In the GCWOAS2 approach, opposition-based learning (OBL) method was initially utilized for initializing the scheduling approach for generating the optimum scheduling method.Though several load scheduling methods are available in the literature,there is still need to explore and improve the scheduling performance on the IoT and cloud environment.

3 The Proposed Model

In this study, a new IDHOA-T2F technique has been presented for load scheduling in IoT cloud environment.The IDHOA-T2F technique involves a T2F system with distinct input variables for scheduling load in the IoT cloud environment.Besides, the IDHOA technique is applied to appropriately select the membership functions(MFs)of the T2F system.The IDHOA-T2F technique has established a multi-objective fitness function(FF)dependent upon load balancing(LB)and energy utilization and implemented.

where ω1and ω2are adaptable parameters and ω1+ω2=1.

The detailed working of these processes is given in the succeeding sections.

3.1 Overview of T2F Model

Type-2 fuzzy set(T2F)has considered as fuzzy membership operation;i.e.,the value of membership (membership degree) of all elements of set is fuzzy set in 0 and 1.The structure of T2F model is shown in Fig.1.The sets are utilized in conditions where it can be uncertainty on the values of similar membership.Uncertainty is the procedure of either the membership function (MF) or most of their parameter[17].Assume that transition from normal to fuzzy sets.Therefore,perfectly it can be required for utilizing fuzzy sets type-∞for completing the illustration of uncertainty.Obviously,it could not appreciate this in practice,as it could not for utilizing fuzzy sets of finite type.So,type-1 fuzzy sets (T1FS) are assumed as 1st order estimates of uncertainty, but T2FS are regarded as 2nd order estimates.T2FS are generalization procedures of individuals of type-l(with FOU as additional degree of freedom).

In the mathematical way, a T2FS is referred as, is considered by type-2 MF(x,u), wherex∈Xandu∈Jχ?[0,1]:i.e.,

where 0 ≤(x,u)≤1.In order to continuous universe of discourse,is written as:

whereJχis signified the initial membership ofx.Thus type-l fuzzy logic (T1FL), discrete fuzzy sets are demonstrated as symbolrather than ∫.The secondary MF connected toχ=χ′,to providedχ′∈X,is type-l MF determined as(x=x′,u),?u∈Jx.

Type-2 MFs:Type-2 fuzzy logic(T2FL)methods were considered as the procedure of its MFs.In 2 varying MFs:(a)a classic type-l MF and(b)a blurred type-1 MF which signifies the type-2 MF.

Figure 1:Structure of T2F model

The uncertainty in first membership of T2FSis demonstrated as FOU.Noticeable the FOU is also the union of every primary membership:

The upper as well as lower MFs,denoted by(x)and(x),respectively,are two type-l membership.

Fuzzifier:The MF type-2 offers many degrees of membership to all inputs.So, the uncertainty is further signified.This illustration permits us to taken to account that is unnoticed by type-l.The fuzzifier map the input vector(e1,e2,...,en)Ton a type-2 fuzzy(T2F)system,most same to process carried out in T1FL system.

Rules:The common procedure ofithrule of T2FL is expressed as:

Inference Engine:In fuzzy model interval type-2 utilizing the minimal or productt-norms operation, theithstimulated ruleFi(x1,...xn) offers us the interval which is defined as 2 extremes,

whereandare provided as:

Type Reducer:Afterward the rule is fired and inference is applied, the attained T2F system resultant in type-1 fuzzy(T1F)system was calculated.During this part,the accessible techniques for computing the centroid of T2F system utilizing the extension lead rule are discussed.The centroid of T1F systemAis provided as:

wherenindicates the amount of discretized domains ofA,zi∈R,andwi∈[0,1].When allziandwiare exchanged with T1F system,ZiandWi,with connected to MF ofμZ(zi)andμW(Wi)correspondingly as utilizing the extension rule is generalization centroid for T2F systemis provided as:

Timplies thet-norm andrefers the T1F system.In order to interval T2F system,

Defuzzifier:For getting a crisp output from T1FL system,the type-reduced set is defuzzified.One of the general techniques for finding the centroid of type-reduced set.When the type_reduced setYimplies discretized tonpoint,at that time the subsequent written offers the centroid of type_reduced set as:

It is calculated the output utilizing the iterative Karnik Mendel Algorithms.So, the defuzzified output ofIT2FLCis

With

3.2 Design of IDHOA Technique for MF Selection

In order to choose the optimal MFs of the T2FS approach,the IDHOA is derived.A new metaheuristic DHO technique was presented[18]that is simulated as hunting of deer by a set of hunters.For hunting the deer,the hunter surrounds it and travels near dependent upon any approaches.The approaches contain the concern of different parameters as wind angle,deer place,etc.Co-operation amongst the hunter is another essential condition which creates the hunting effectual.Eventually,it can influence the target dependent upon place of leader and successor.An objective functions of this presented technique is provided in Eq.(16).

The steps for weight optimized utilizing DHO technique are discussed under Because of the different capabilities of deer,it simply escapes from hunting by predators.The technique begins with vector of arbitrary population is named hunters.This procedure is defined as:

Winston Churchill failed sixth grade. He did not become Prime Minister of England until he was 62, and then only after a lifetime of defeats and setbacks. His greatest contributions came when he was a “senior citizen.”

wheremrepresents the amount of hunters population (weight) and the entire amount of weight implemented to optimized are signified asX.It can be determined in Eq.(18)[18],

where, the arbitrary number containing range 0 and 1 has signified asa, and the current iteration is signified asJ.At this point,θrefers the wind angle.After, the place propagation with successor place(Xs)and leader place(Xl)to optimized was established.The successor place explains the place of following weight but the leader place explains the primary optimum place of hunter.

After initializing the optimum place,all weights in population effort to influence which optimum place[19].Then,the place upgradation model starts by modelling the surrounding performance that is determined in Eq.(19),

where,Xjimplies the place at the current iteration and the succeeding iteration place has demonstrated asXj+1.The 2 coefficient vectorsZandKare contained in this technique.The arbitrary number which is established by regarding the wind speed is signified asp, and it comprises values from (0–2).The expression for evaluating the coefficient vectorsZandKare illustrated in Eqs.(20)and(21)[18],

where the maximal iteration is signified asjmax.A primary place of hunter was signified as(X,Y)that obtains upgraded dependent upon place of prey.The 2 coefficient vectorsZandKare according to gain the optimum place(Xb,Yb).When the value ofp <1,afterward the place upgrade model occurs that means the hunter is arbitrarily moves in varied ways without regarding the position angle.

The position angle upgradation has been regarded for increasing the search space.For making the hunting model effectual,it can be important for determining the position angle of hunter.According to position angle,the place upgrade was carried out utilizing in Eq.(22),

where the optimum place has signified asB=φj+1,Xbjandpimplies the arbitrary number.

In the exploration,Kvector has been established within the surrounding performance.Primarily,the arbitrary search model was performed regarding the value ofKlesser to 1.Eventually,the place upgrade model occurs on the basis of successor position instead of assuming the optimum place.Afterward,the global search is carried out utilizing the Eq.(23),

The place upgraded model was performed for identifying the optimum place (for instance, end condition).The flowchart of the DHOA technique is depicted in Fig.2.

Figure 2:Flowchart of the DHOA technique

The IDHOA technique is derived by integrating the concepts of Nelder Mead (NM) with the DHOA.In NM simplex search is part of common class of direct search techniques.It can be most famous technique to resolve unconstrained non-linear optimized issues without utilizing derivatives[20–22].In general,it can be utilized for local optimization.The NM technique tend for minimizing a non-linear scalar function ofnvariables by utilizing only the estimation of objective functions.Primarily, the NM technique carries out their initial simplex, Δ1, ofn+ 1 vertices from beginning pointx0,where the vertex signifies the variable set,x,ofnparameter.

4 Performance Validation

This section investigates the performance of the proposed IDHOA-T2F technique under different aspects.A brief total energy consumption analysis of the IDHOA-T2F technique takes place in Tab.1 and Fig.3.From the outcomes, it can be demonstrated that the IDHOA-T2F approach has accomplished least TEC over the other techniques.For instance,with 100 resources,the IDHOA-T2F technique has offered a lower TEC of 26J whereas the ACO-PSO,GA,and social spider optimization algorithm (SSOA) techniques have provided a maximum TEC of 76J, 58J, and 34J respectively.In addition,with 150 resources,the IDHOA-T2F approach has existed a minimal TEC of 53J whereas the ACO-PSO,GA,and SSOA methods have given a superior TEC of 65J,74J,and 63J correspondingly.Likewise,with 250 resources,the IDHOA-T2F technique has accessible a lower TEC of 80J whereas the ACO-PSO, GA, and SSOA methodologies have provided a higher TEC of 203J, 143J, and 96J correspondingly.

Table 1:Total energy consumption analysis of proposed IDHOA-T2F model

Figure 3:Total energy consumption analysis of IDHOA-T2F model

Tab.2 and Fig.4 offer the load balance degree analysis of the IDHOA-T2F technique under varying data sizes.From the obtained values,it is ensured that the IDHOA-T2F technique has resulted in a higher load balance degree compared to other techniques.For instance,with the data size of 100,the IDHOA-T2F technique has resulted in an increased load balance degree with 0.59 whereas the TEENA, MOFA, and SSOA techniques have accomplished a reduced load balance degree of 0.19,0.42,and 0.52 respectively.In line with,the data size of 300,the IDHOA-T2F approach has resulted in an improved load balance degree of 0.8 whereas the TEENA, MOFA, and SSOA manners have accomplished a minimal load balance degree of 0.45, 0.59, and 0.75 correspondingly.At the same time, with the data size of 500, the IDHOA-T2F method has resulted in a maximum load balance degree of 0.92 whereas the TEENA, MOFA, and SSOA manners have accomplished a lesser load balance degree of 0.65,0.79,and 0.87 correspondingly.

Table 2:Load balance degree analysis of IDHOA-T2F model

Figure 4:Load balance degree analysis of IDHOA-T2F model

Brief fitness analysis of the IDHOA-T2F technique takes place under different iterations and runs in Tab.3 and Fig.5.The IDHOA-T2F technique has resulted in a better fitness value under all iterations.For instance, with iteration 10, the IDHOA-T2F technique has obtained a fitness value of 0.40, 0.38, and 0.37 under three distinct runs 1–3 respectively.Moreover, with iteration 50, the IDHOA-T2F method has reached a fitness value of 0.22, 0.21, and 0.14 under 3 different runs 1–3 correspondingly.Furthermore,with iteration 150,the IDHOA-T2F algorithm has gained a fitness value of 0.17,0.16,and 0.11 under three varying runs 1–3 respectively.Additionally,with iteration 350,the IDHOA-T2F method has obtained a fitness value of 0.15,0.13,and 0.10 under three various runs 1–3 correspondingly.In the same way,with iteration 550,the IDHOA-T2F methodology has attained a fitness value of 0.14,0.12,and 0.10 under 3 distinct runs 1–3 respectively.At last,with iteration 850,the IDHOA-T2F approach has achieved a fitness value of 0.13, 0.12, and 0.10 under three distinct runs 1–3 correspondingly.

Table 3:Result analysis of IDHOA-T2F model with different iterations and runs

Figure 5:Result analysis of IDHOA-T2F model with different runs

For ensuring the improved performance of IDHOA-T2F technique,a comparison study is made in Tab.4 and Fig.6.The experimental outcomes stated that the IDHOA-T2F approach has accomplished superior performance over the SSOA technique.For instance, with 10 iterations, the IDHOA-T2F technique has attained a lower fitness function of 0.37 whereas the SSOA has obtained an increased fitness value of 0.40.In addition,with 100 iterations,the IDHOA-T2F method has reached a lesser fitness function of 0.12 whereas the SSOA has attained a maximum fitness value of 0.23.Similarly,with 350 iterations, the IDHOA-T2F algorithm has gained a lesser fitness function of 0.10 whereas the SSOA has obtained an improved fitness value of 0.19.Moreover,with 500 iterations,the IDHOAT2F methodology has attained a minimal fitness function of 0.10 whereas the SSOA has obtained an enhanced fitness value of 0.19.Furthermore,with 700 iterations,the IDHOA-T2F technique has obtained a lower fitness function of 0.10 whereas the SSOA has reached a superior fitness value of 0.19.At last,with 850 iterations,the IDHOA-T2F technique has obtained the least fitness function of 0.10 whereas the SSOA has gained an improved fitness value of 0.19.The experimental outcomes demonstrate the promising outcome of IDHOA-T2F technique over the recent techniques due to the inclusion of T2F and IDHOA.

Table 4:Comparative analysis of IDHOA-T2F model under varying iterations

Figure 6:Comparative analysis of IDHOA-T2F model with distinct iterations

5 Conclusion

In this study, a new IDHOA-T2F technique has been presented for load scheduling in IoT cloud environment.The IDHOA-T2F technique involves a T2F system with distinct input variables for scheduling load in the IoT cloud environment.Besides, the IDHOA technique is applied to appropriately select the MFs of the T2F system.The proposed model finds useful to improve the efficiency of IoT models.For validating the enhanced load scheduling efficiency of the IDHOA-T2F technique,a series of simulations take place to highlight the improved performance.The experimental outcomes demonstrate the promising outcome of IDHOA-T2F technique over the recent techniques.In future,the outcome of the IDHOA-T2F technique is extended to the design of context aware route planning in the IoT cloud platform.

Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (RGP 2/209/42).This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-Track Path of Research Funding Program.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 免费国产高清视频| 欧美黄网站免费观看| 国产区福利小视频在线观看尤物| 在线免费观看AV| 亚洲欧洲天堂色AV| 午夜天堂视频| 欧美午夜在线播放| 国产色伊人| 成人在线亚洲| 免费毛片视频| 欧美三级自拍| 一级毛片不卡片免费观看| 色综合久久无码网| 国产伦精品一区二区三区视频优播| 亚洲精品天堂在线观看| 欧美成人区| 午夜国产精品视频黄 | 夜夜操天天摸| 精品国产三级在线观看| 国产一国产一有一级毛片视频| 亚洲国产无码有码| 国产精品偷伦在线观看| 欧美激情,国产精品| 91无码视频在线观看| 成人伊人色一区二区三区| 国产精品第页| 国产成人在线小视频| 色135综合网| 手机在线国产精品| 国产精品va| 日韩欧美国产中文| 8090午夜无码专区| 国产福利在线免费观看| 精品视频一区二区三区在线播| 欧美成人亚洲综合精品欧美激情| 亚洲精品卡2卡3卡4卡5卡区| 伊人狠狠丁香婷婷综合色| 亚洲国产清纯| AV天堂资源福利在线观看| 亚洲欧美一区二区三区图片 | 日韩AV无码一区| 亚洲第一成年免费网站| 国产 日韩 欧美 第二页| 亚卅精品无码久久毛片乌克兰| 免费Aⅴ片在线观看蜜芽Tⅴ| 亚洲不卡无码av中文字幕| 精品伊人久久久香线蕉| 亚洲日韩精品无码专区97| 日韩久草视频| 国产精品亚洲日韩AⅤ在线观看| 狂欢视频在线观看不卡| 日韩欧美国产成人| 99久久国产自偷自偷免费一区| 午夜在线不卡| 美女无遮挡被啪啪到高潮免费| 久久这里只精品国产99热8| 国产精品男人的天堂| 亚洲国产高清精品线久久| 亚洲第一页在线观看| 国产屁屁影院| 91在线播放国产| 国产精品xxx| 毛片网站在线看| 免费在线a视频| 亚洲综合九九| 91精品综合| 精品国产Av电影无码久久久| 五月天久久婷婷| 国产午夜精品一区二区三| 久久频这里精品99香蕉久网址| 91在线精品麻豆欧美在线| 久久美女精品国产精品亚洲| 中日韩一区二区三区中文免费视频 | 国产欧美精品午夜在线播放| 久久综合色视频| 日韩无码视频网站| 国产精品久久久久久搜索| 黄色网页在线观看| 天天做天天爱天天爽综合区| 性网站在线观看| 国产精选自拍| 国产裸舞福利在线视频合集|